Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe
Resource
win10v2004-20230220-en
General
-
Target
18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe
-
Size
536KB
-
MD5
590cb7e81d36ef373ab1deaf45d60a23
-
SHA1
a30184f197b4c81ebadd535d2c944ae72877ca03
-
SHA256
18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b
-
SHA512
75d0628fbfd14cca95ee81cc428c57aa8348576b3f158aa542ce73c5fd973baea0d5bcf336ba713ac12796e56233be9f96a0a74cab01441aaf1d1cc4fa182060
-
SSDEEP
12288:CMrPy90FKd7qVTjI0V1G32dmYiCLSxiqkQB:pym5V40VY32dziCFbQB
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw09bx46IF92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw09bx46IF92.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw09bx46IF92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw09bx46IF92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw09bx46IF92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw09bx46IF92.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/696-157-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-158-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-160-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-162-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-164-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-166-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-168-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-170-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-172-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-174-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-176-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-178-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-180-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-182-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-184-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-186-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-188-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-190-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-212-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-214-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-216-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-218-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline behavioral1/memory/696-220-0x0000000004C70000-0x0000000004CAE000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 4608 vpW6807aL.exe 488 sw09bx46IF92.exe 696 tuI54MV25.exe 4884 uCV14bW38.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw09bx46IF92.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vpW6807aL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vpW6807aL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4300 696 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 488 sw09bx46IF92.exe 488 sw09bx46IF92.exe 696 tuI54MV25.exe 696 tuI54MV25.exe 4884 uCV14bW38.exe 4884 uCV14bW38.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 488 sw09bx46IF92.exe Token: SeDebugPrivilege 696 tuI54MV25.exe Token: SeDebugPrivilege 4884 uCV14bW38.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4608 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 87 PID 3768 wrote to memory of 4608 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 87 PID 3768 wrote to memory of 4608 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 87 PID 4608 wrote to memory of 488 4608 vpW6807aL.exe 88 PID 4608 wrote to memory of 488 4608 vpW6807aL.exe 88 PID 4608 wrote to memory of 696 4608 vpW6807aL.exe 94 PID 4608 wrote to memory of 696 4608 vpW6807aL.exe 94 PID 4608 wrote to memory of 696 4608 vpW6807aL.exe 94 PID 3768 wrote to memory of 4884 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 98 PID 3768 wrote to memory of 4884 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 98 PID 3768 wrote to memory of 4884 3768 18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe"C:\Users\Admin\AppData\Local\Temp\18c79cb75b6c6ff5decbac074fbf185cd7bd3d447eff2a8b98d497bb9d20956b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpW6807aL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vpW6807aL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw09bx46IF92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw09bx46IF92.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuI54MV25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tuI54MV25.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 13564⤵
- Program crash
PID:4300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uCV14bW38.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uCV14bW38.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 696 -ip 6961⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
177KB
MD5ad1bf1c5b167a3fdd9e654c3dc1b506e
SHA1f40f231d86b8c764296228ce6ccb4bb0fd3ba279
SHA25619eb9333ba131a925a286514f5143f0bf4c8269d2bba19553dc70d3bbfacb893
SHA51216e7b4182c600a2efda29fac4338ca9a88063e9e338dd5eedd73d411fef78deb5320aef690d5dc4e5c52e197364b4401260d90ce5d9bae02c2a6e47ebd6578e8
-
Filesize
177KB
MD5ad1bf1c5b167a3fdd9e654c3dc1b506e
SHA1f40f231d86b8c764296228ce6ccb4bb0fd3ba279
SHA25619eb9333ba131a925a286514f5143f0bf4c8269d2bba19553dc70d3bbfacb893
SHA51216e7b4182c600a2efda29fac4338ca9a88063e9e338dd5eedd73d411fef78deb5320aef690d5dc4e5c52e197364b4401260d90ce5d9bae02c2a6e47ebd6578e8
-
Filesize
391KB
MD5fbd6abfc5b371c07c862f608e939c30b
SHA191e8155f646cdcae00fb38b6771aa7518f606023
SHA2565c7b228f1d969c714ec7939f031ca441e74bfb192cf983ca80817f391832486f
SHA512174cc3608db4074fe0d895d504371657d1bd82da48dfbacc95d173ded03ddd32d3acf10af34fffed4695aacf165577a80570187246205bba518d52b660e7580e
-
Filesize
391KB
MD5fbd6abfc5b371c07c862f608e939c30b
SHA191e8155f646cdcae00fb38b6771aa7518f606023
SHA2565c7b228f1d969c714ec7939f031ca441e74bfb192cf983ca80817f391832486f
SHA512174cc3608db4074fe0d895d504371657d1bd82da48dfbacc95d173ded03ddd32d3acf10af34fffed4695aacf165577a80570187246205bba518d52b660e7580e
-
Filesize
17KB
MD5fcaf81a81064a8a8487c4624532eba33
SHA111d6c35c3b4e0b23c3fd9594318707fd1271833b
SHA2566e2f7abcf13dcda5e398861fffa4e47be21ca567bc11794559c03f2965753699
SHA512eb6cace4f7728b03d636e58a4cf5bc79defb8b74a0b49ac600551631fcf10e421b901d636b4ffb3439562bc6d71b2c48c4b4934f7a238c2b6fcc1252171bf1e1
-
Filesize
17KB
MD5fcaf81a81064a8a8487c4624532eba33
SHA111d6c35c3b4e0b23c3fd9594318707fd1271833b
SHA2566e2f7abcf13dcda5e398861fffa4e47be21ca567bc11794559c03f2965753699
SHA512eb6cace4f7728b03d636e58a4cf5bc79defb8b74a0b49ac600551631fcf10e421b901d636b4ffb3439562bc6d71b2c48c4b4934f7a238c2b6fcc1252171bf1e1
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a